User Authentication with Graphical Passwords using Hybrid Images and Hash Function

2021 ◽  
pp. 247-257
Author(s):  
Sachin Davis Mundassery ◽  
Sreeja Cherillath Sukumaran
2008 ◽  
Vol 3 (1) ◽  
pp. 66-71
Author(s):  
Raj Mohammed ◽  
Shoba Bindu C ◽  
Chandra Sekhar Reddy P ◽  
Satya Narayana B

2019 ◽  
Vol 8 (4) ◽  
pp. 4411-4417

Authenticating users to secure systems is a crucial task for security experts to solve a password problem, where user should able to memorize a password or secret and password should be hard to guess and crack by adversaries. In general, Most of the secure systems were designed with text passwords along with additional factors such as tokens like smart card, mobile device. Text passwords are not resistant to dictionary, brute-force and guessing attacks. This paper proposes a novel graphical password method, which solves the password problem and secure against all password vulnerabilities. Theoretically, graphical passwords are easy to memorize and recall them easily for long term and resistant to dictionary and brute-force search attacks


Author(s):  
Mishall Al-Zubaidie ◽  
Zhongwei Zhang ◽  
Ji Zhang

Supporting a mechanism to authenticate members in electronic health record (EHR) is a fundamental procedure to prevent different threats from penetrating patients' identities/data. Existing authentication schemes still suffer from security drawbacks. Exchanging medical-related information/data between clients and the servers leaves them compromised to breakthrough by intruders as they can transmit over an unreliable environment. To guarantee the protection of patient records, this chapter proposes a new scheme that provides authentication of patients/providers in EHR depending on the legitimate member identities and the device information. The scheme utilizes an elliptic curve cryptography and lightweight hash function to accomplish robust security with satisfying performance. Moreover, it depends on a set of techniques such as multi-pseudonyms to authenticate legitimate members. Additionally, concentrated theoretical and experimental analysis proves that the proposed provides elevated performance and security compared to existing research.


Author(s):  
Muhammad H. Alharbi ◽  
Omar H. Alhazmi

In the Internet of things (IoT), the user authentication process is becoming more critical with the growing number of the services provided by IoT. Securing access to these services by the user authentication process leads to high security to prevent any attack on the IoT network. The approach keeps the private information secured efficiently and ensuring that only authorized users can access this information. The proposed scheme uses only Chaskey hash function and XOR operation. The security analysis proves that it is immune to different types of attacks. Furthermore, the scheme is faster, lighter on resources and energy consumption compared to other existing schemes. Finally, we compare the proposed scheme to several other existing schemes on several aspects highlighting main differences.


2016 ◽  
Vol 24 (1) ◽  
pp. 53-72 ◽  
Author(s):  
Panagiotis Andriotis ◽  
George Oikonomou ◽  
Alexios Mylonas ◽  
Theo Tryfonas

Purpose – The Android pattern lock screen (or graphical password) is a popular user authentication method that relies on the advantages provided by the visual representation of a password, which enhance its memorability. Graphical passwords are vulnerable to attacks (e.g. shoulder surfing); thus, the need for more complex passwords becomes apparent. This paper aims to focus on the features that constitute a usable and secure pattern and investigate the existence of heuristic and physical rules that possibly dictate the formation of a pattern. Design/methodology/approach – The authors conducted a survey to study the users’ understanding of the security and usability of the pattern lock screen. The authors developed an Android application that collects graphical passwords, by simulating user authentication in a mobile device. This avoids any potential bias that is introduced when the survey participants are not interacting with a mobile device while forming graphical passwords (e.g. in Web or hard-copy surveys). Findings – The findings verify and enrich previous knowledge for graphical passwords, namely, that users mostly prefer usability than security. Using the survey results, the authors demonstrate how biased input impairs security by shrinking the available password space. Research limitations/implications – The sample’s demographics may affect our findings. Therefore, future work can focus on the replication of our work in a sample with different demographics. Originality/value – The authors define metrics that measure the usability of a pattern (handedness, directionality and symmetry) and investigate their impact to its formation. The authors propose a security assessment scheme using features in a pattern (e.g. the existence of knight moves or overlapping nodes) to evaluate its security strengths.


Author(s):  
Touraj Khodadadi ◽  
A.K.M. Muzahidul Islam ◽  
Sabariah Baharun ◽  
Shozo Komaki

<p>User Authentication is a critical component in information security. Several widely used mechanisms for security to protect services from illegal access include alphanumerical usernames passwords. However, there are several drawbacks attached in this method. For instance, the users themselves usually those passwords that are easy to guess. As difficult passwords are difficult to recall. A new alternative is the graphic-based password and there has been a growing trend in the use of such a password. The human psychology study reveals that humans find it easier to remember pictures as opposed to words. There are two main aspects to the graphical password scheme, namely security and usability. This study comprises of a comprehensive research in the current Recognition-Based graphical password schemes. The common usability attributes and possible attacks on the Recognition-Based graphical password are reviewed, identified and examined in detail. There are several previous surveys on the graphical passwords. The latest research review and summarize graphical password systems concisely and at the same time, analyze usability features for every design. However it was found that there is not a single method that has the most resounding usability attributes. Therefore, this research suggests a set of usability attributes that can be applied into a single Recognition-Based graphical password system. In addition, this study examines and compares success rates on login, login time and memorability of existing systems which are the usability measures most often reported in user studies of graphical passwords.  Lastly, a comparison table is revealed to put forth the limitations and strengths of each approach in terms of security and usability.</p>


2011 ◽  
Vol 317-319 ◽  
pp. 1791-1796
Author(s):  
Chao Jing

Increasing number of network applications require authentication of the user's identity which is the first step to ensure security. This paper analyzes the security performance of one proposed remote two-factor user authentication scheme and discusses the attacks it suffers. Then we propose an improved scheme based on the RSA cryptography and one-way secure hash function to avoid the attacks it suffers. After that we prove the proposed scheme is autonomous and effective for both sides in the authentication process.


Sign in / Sign up

Export Citation Format

Share Document